POC详情: 2ca2ce839549b1f422df974a0c608d4a25448738

来源
关联漏洞
标题: Mozilla Firefox 安全漏洞 (CVE-2024-4367)
描述:Mozilla Firefox是美国Mozilla基金会的一款开源Web浏览器。 Mozilla Firefox 126 版本之前存在安全漏洞,该漏洞源于处理 PDF.js 中的字体时缺少类型检查,这将允许在 PDF.js 环境中执行任意 JavaScript。
介绍
# CVE-2024-4367: Arbitrary JavaScript Execution in PDF.js

## Overview
CVE-2024-4367 is a critical vulnerability in the PDF.js library that allows arbitrary JavaScript execution in a user's browser, leading to Cross-Site Scripting (XSS) attacks. This affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.

## Usages

### Node in /app
```bash
npm install
```
```bash
npm start
```

### PoC
- `python3 poc.py <payload>`
- Example: `python3 poc.py "alert(1)"`

### Demo Videos
- [Demo 1 (Firefox)](https://www.youtube.com/watch?v=s4V5fL3AQew)
- [Demo 2 (pdfjs-dist)](https://www.youtube.com/watch?v=dWHtNF5-MKk)

## Mitigation
- Update PDF.js to a version higher than 4.1.392.
- Ensure your Firefox, Firefox ESR, or Thunderbird is up-to-date with the latest security patches.

## Detailed Analysis
For a comprehensive analysis of CVE-2024-4367, [read here](https://masamuneee.github.io/posts/cve-2024-4367/).

## PoC references
- https://github.com/LOURC0D3/CVE-2024-4367-PoC
- https://github.com/s4vvysec/CVE-2024-4367-POC
文件快照

[4.0K] /data/pocs/2ca2ce839549b1f422df974a0c608d4a25448738 ├── [4.0K] app │   ├── [ 331] package.json │   ├── [4.0K] public │   │   └── [2.0K] index.html │   └── [ 522] server.js ├── [4.0K] poc │   ├── [1.8K] poc.pdf │   ├── [2.4K] poc.py │   └── [ 18K] sample.pdf └── [1.0K] README.md 3 directories, 7 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。